Impact
A stack‑based buffer overflow exists in the formSetPassword function of Belkin F9K1122 firmware 1.00.33. The vulnerability allows an attacker to overwrite stack memory through a specially crafted HTTP request to the /goform/formSetPassword endpoint, potentially leading to arbitrary code execution. This flaw directly compromises the confidentiality, integrity, and availability of the device and is classified as a buffer overflow weakness (CWE‑119, CWE‑121, CWE‑787).
Affected Systems
The only affected product is the Belkin F9K1122 router running firmware version 1.00.33. No other firmware versions are indicated. The vulnerable component is the Parameter Handler exposed via the router’s web interface.
Risk and Exploitability
The CVSS base score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests low current exploitation activity but publicly available exploit code exists. The flaw is not listed in the CISA KEV catalog. An attacker can remotely exploit the issue by sending crafted requests to the /goform/formSetPassword endpoint, with no local privileges required. Consequently, any network that exposes the router’s web interface to untrusted users faces significant risk.
OpenCVE Enrichment